During a security audit, an organization discovered unauthorized programs on multiple workstations. Investigations revealed that employees had attached external hardware that contained malicious software. Which approach can best address this risk?
Establish perimeter firewall settings that forward suspicious traffic for analysis.
Create a policy that enforces encryption for local disks.
Use an enterprise tool that requires administrators to authorize newly attached hardware.
Enable endpoint encryption to secure each workstation.
Requiring administrators to authorize newly attached hardware prevents unexpected devices from being used. Endpoint encryption does not stop suspicious software from running, local disk encryption policies do not curb unauthorized attachments, and a perimeter firewall setting does not control local device usage. Restricting usage of removable media through an approval process directly tackles the root issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What tools are used by enterprises to authorize newly attached hardware?
Open an interactive chat with Bash
Why is endpoint encryption not effective in preventing unauthorized hardware use?
Open an interactive chat with Bash
How does restricting removable media through a policy improve security?